Sciweavers

264 search results - page 53 / 53
» Portable Execution Time Analysis Method
Sort
View
IUI
1993
ACM
15 years 3 months ago
Wizard of Oz studies: why and how
We discuss current approaches to the development of natural language dialogue systems, and claim that they do not sufficiently consider the unique qualities of man-machine intera...
Nils Dahlbäck, Arne Jönsson, Lars Ahrenb...
ECRA
2010
111views more  ECRA 2010»
14 years 11 months ago
RDRP: Reward-Driven Request Prioritization for e-Commerce web sites
Meeting client Quality-of-Service (QoS) expectations proves to be a difficult task for the providers of e-Commerce services, especially when web servers experience overload condit...
Alexander Totok, Vijay Karamcheti
RAID
2010
Springer
14 years 10 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
15 years 3 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter